“Ooh Aah… Just a little bit”: A small amount of side channel can go a longway

被引:106
作者
Benger, Naomi [1 ]
van de Pol, Joop [2 ]
Smart, Nigel P. [2 ]
Yarom, Yuval [1 ]
机构
[1] School of Computer Science, The University of Adelaide
[2] Dept. Computer Science, University of Bristol
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8731卷
基金
英国工程与自然科学研究理事会;
关键词
41;
D O I
10.1007/978-3-662-44709-3_5
中图分类号
学科分类号
摘要
We apply the FLUSH+RELOAD side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a “standard” lattice technique to extract the private key, but unlike previous attacks we are able to make use of the side-channel information from almost all of the observed executions. This means we obtain private key recovery by observing a relatively small number of executions, and by expending a relatively small amount of post-processing via lattice reduction. We demonstrate our analysis via experiments using the curve secp256k1 used in the Bitcoin protocol. In particular we show that with as little as 200 signatures we are able to achieve a reasonable level of success in recovering the secret key for a 256-bit curve. This is significantly better than prior methods of applying lattice reduction techniques to similar side channel information © International Association for Cryptologic Research 2014.
引用
收藏
页码:75 / 92
页数:17
相关论文
共 40 条
  • [11] Brumley B.B., Tuveri N., Remote timing attacks are still practical, ESORICS 2011.LNCS, vol. 6879, pp. 355-371, (2011)
  • [12] Cade D., Pujol X., Stehle D., The US Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon
  • [13] Canteaut A., Lauradoux C., Seznec A., Understanding cache attacks. Technical Report 5881, INRIA, (2006)
  • [14] Chen C., Wang T., Kou Y., Chen X., Li X., Improvement of trace-driven I-Cache timing attack on the RSA algorithm, The Journal of Systems and Software, 86, 1, pp. 100-107, (2013)
  • [15] Chen Y., Nguyen P.Q., BKZ 2.0: Better lattice security estimates, ASIACRYPT 2011.LNCS, 7073, pp. 1-20, (2011)
  • [16] Cipresso T., Stamp M., Software reverse engineering, Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, 31, pp. 659-696, (2010)
  • [17] Faz-Hernandez A., Longa P., Sanchez A.H., Efficient and secure algorithms for GLVbased scalar multiplication and their implementation on GLV-GLS curves. Cryptology ePrint Archive, Report 2013/158, (2013)
  • [18] Gallant R.P., Lambert R.J., Vanstone S.A., Faster point multiplication on elliptic curves with efficient endomorphisms, CRYPTO 2001.LNCS, vol. 2139, pp. 190-200, (2001)
  • [19] Gopalakrishnan K., Theriault N., Yao C.Z., Solving discrete logarithms from partial knowledge of the key, INDOCRYPT 2007.LNCS, vol. 4859, pp. 224-237, (2007)
  • [20] Gullasch D., Bangerter E., Krenn S., Cache games —bringing access-based cache attacks on AES to practice, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, United States, pp. 490–595, (2011)